Solved

How to encrypt the router and extender

Posted on 2011-02-28
7
368 Views
Last Modified: 2012-06-27
Need to provide step by step instructions, as I am helping someone at a distance.

ROUTER
Linksys Wireless G broadband router.  Model WRT54G.
EXTENDER
Hawkin Hwren1 wireless 300n range extender.

Thanks,
JP
0
Comment
Question by:easycapital
  • 4
  • 3
7 Comments
 
LVL 7

Expert Comment

by:droyden
ID: 35001518
Encrypt what? end to end using a VPN?
0
 

Author Comment

by:easycapital
ID: 35001548
Password protect it, so that unauthorized users can't access the signal sent by the router.
JP
0
 
LVL 7

Expert Comment

by:droyden
ID: 35001899
Under the security settings tab you need to define a passphrase / password key and then select WPA or WPA2 you should then apply the settings and you reconnect using the password
0
PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

 

Author Comment

by:easycapital
ID: 35001914
How does one get the extender to use that password also.
JP
0
 
LVL 7

Accepted Solution

by:
droyden earned 500 total points
ID: 35002168
You should be able to configure which SSID it connects to and then put in the same password as you define on the WRT
0
 
LVL 7

Expert Comment

by:droyden
ID: 35002174
Unable to edit so: it should also be under the security settings
0
 

Author Closing Comment

by:easycapital
ID: 35062009
Thanks,
JP
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

In this tutorial I will show you with short command examples how to obtain a packet footprint of all traffic flowing thru your Juniper device running ScreenOS. I do not know the exact firmware requirement, but I think the fprofile command is availab…
Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

838 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question